Sciweavers

12766 search results - page 2496 / 2554
» collective
Sort
View
185
Voted
CIVR
2010
Springer
246views Image Analysis» more  CIVR 2010»
15 years 2 months ago
Genre-specific semantic video indexing
In many applications, we find large video collections from different genres where the user is often only interested in one or two specific video genres. So, when users are queryin...
Jun Wu, Marcel Worring
119
Voted
CNSM
2010
15 years 2 months ago
DP+IP = design of efficient backup scheduling
Many industries experience an explosion in digital content. This explosion of electronic documents, along with new regulations and document retention rules, sets new requirements f...
Ludmila Cherkasova, Alex Zhang, Xiaozhou Li
FSTTCS
2010
Springer
15 years 2 months ago
The effect of girth on the kernelization complexity of Connected Dominating Set
In the Connected Dominating Set problem we are given as input a graph G and a positive integer k, and are asked if there is a set S of at most k vertices of G such that S is a dom...
Neeldhara Misra, Geevarghese Philip, Venkatesh Ram...
177
Voted
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
15 years 2 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
GLOBECOM
2010
IEEE
15 years 2 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
« Prev « First page 2496 / 2554 Last » Next »